Allowed Only IP addresses in the list can access the device.
4.
Edit the IP address lter list.
Add Add a new IP address or IP address range to the list.
Modify Modify the selected IP address or IP address range in the list.
Delete Delete the selected IP address or IP address range in the list.
5.
Click Save.
10.12.3 Set HTTPS
HTTPS is a network protocol that enables encrypted transmission and identy authencaon,
which improves the security of remote access.
Steps
1.
Go to Conguraon → Network → Advanced Sengs → HTTPS .
2.
Check Enable.
3.
Oponal: Check HTTPS Browsing to access the device only via HTTPS protocol.
4.
Select a server cercate.
Note
●
Complete cercate management before selecng server cercate. Refer to Cercate
Management for detailed informaon.
●
If the funcon is abnormal, check if the selected cercate is abnormal in Cercate
Management.
5.
Click Save.
10.12.4 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log
les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Network Speed Dome User Manual
81